CISSP: A Global Force at 100,000 Strong


Whenever we look toward the future, we have to first look back and think about where we came from. Back in 1989, (ISC)² was established by a handful of passionate volunteers who wanted to create a set of standards for a newer concept, not yet a full-fledged career field, called information security. In the minds of these volunteers, having the initial 500 applicants sign up to take the Certified Information Systems Security Professional (CISSP®) was considered quite a success. Little did they imagine that 26 years later, not only would those 500 applicants grow to a cadre of 100,000 CISSP credential holders across more than 160 countries, further, the CISSP would also become recognized as the standard certification for the information security industry.

(ISC)² was honored to be named ‘Best Professional Certification Program’ for the CISSP by SC Magazine US for the second year in a row, marking our fourth total SC Magazine Award for CISSP. And we’ve been named a finalist for the first ‘Best Professional Training or Certification Programme’ SC Magazine Award UK for CISSP. Those results are to be announced June 2.

As an organization, we certainly aren’t resting on our laurels, satisfied that the CISSP has “arrived.” We continue to actively maintain and enhance the credential, while also focusing on developing and raising awareness for our other credentials. A perfect example of this commitment occurred last month when we refreshed the domains of the SSCP and CISSP to ensure that the examinations and subsequent continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today’s practicing information security professionals. We have an obligation to the (ISC)² membership and the industry to maintain the relevancy of our credentials.

Refreshed technical content has also been added to the Official (ISC)² CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization’s information security program within an ever-changing security landscape.

While we recognize this milestone achievement of 100,000 certified members and look toward the future of the CISSP within the industry, we also need to take into account that (ISC)² has an entire suite of credentials that encompass a holistic, programmatic approach to information security. The CISSP has a 25+ year history and is our most recognized credential; however, it is not necessarily the most appropriate certification for every security professional. (ISC)² has a portfolio of credentials appropriate for the entire security team comprised of information security professionals, software security professionals, IT practitioners, authorization professionals and those specializing in healthcare, forensics and cloud security. For those just starting in the field, we also offer an Associate of (ISC)² program.

As executive director, I’m committed to advancing our vision to inspire a safe and secure cyber world. Hopefully that vision is getting closer to becoming reality with our global force of 100,000 CISSPs and growing. I thank all of the current CISSPs for the great work they’re doing and wish the best of luck to aspiring CISSPs. Keep fighting the good fight.

David Shearer, CISSP, PMP, Executive Director, (ISC)²

[(ISC)² Blog]

Palo Alto Networks Acquires CirroSecure

I’m excited to announce the acquisition of CirroSecure and with it the expansion of our platform’s ability to safely enable the applications that form the backbone of today’s businesses.

Increasingly organizations are turning to SaaS applications such as Box, Dropbox, or salesforce.com that are highly collaborative in nature, yet often store some of an organization’s most sensitive data.  Securing these sanctioned applications requires a new level of visibility and control that, up to this point, hasn’t existed within the industry.  Ultimately organizations must have the ability to peer deep into the application, tracking usage at a granular enough level to allow for more effective control.  This control must allow for better management of access privileges and data sharing, from both corporate and personal devices. 

The addition of the CirroSecure technology to the Palo Alto Networks Enterprise Security Platform provides organizations with this necessary functionality by extending visibility down to the individual file, folder and user that’s operating within the SaaS application.  The CirroSecure technology then applies deep analytics into the day-to-day usage in order to quickly determine if there are any DLP or compliance-related policy violations.  Then, through use of granular context-aware policies, violations can trigger an immediate response such as the quarantine of a user or data.  This complete visibility, coupled with granular policy controls, moves organizations from a position of speculation to one of knowing exactly what’s happening to its sensitive SaaS application data at any given point in time, while automatically responding to contain or eliminate risks.

This innovative technology will be available the second half of 2015 via a new Palo Alto Networks service.  Over the course of the next few months we’ll share more detail with regards to future strategy, product features, and demonstrations.  If you’d like these periodic updates, make sure to visit our announcement page at go.paloaltonetworks.com/saassecurity and sign up for automated updates.

Scott Gainey

[Palo Alto Networks Blog]

APT and Social Engineering: With New Threats Come New Assessment Methodologies

During the last few years, companies have evolved exponentially through the adoption of new technologies, devices and habits that allow them to improve the business from one side, but also to be more vulnerable to cyberattacks from the other. As the attack surface expands and cyberattacks evolve using different techniques and vectors, companies need to adapt their assessment methodologies, going beyond the traditional vulnerability and malware identification or data loss prevention.

For example, consider advanced persistent threats (APT). They are probably the most dangerous threats. They target specific companies and rely on social engineering as the main vector to gain access to inner information and communications technology (ICT) systems. In order to face these threats, companies should start considering possible tools or methodologies to evaluate their risk and the real extent of their exposure. What makes a corporation an attractive target? Could the employees effectively face an advanced social engineering attack? How simple is it to perform a technological attack against workstations? What kind of information is reachable and which assets are exploitable from hidden backdoors?

In my recent Journal article, I talk about the social engineering threat and human factor vulnerabilities, describing a management approach that involves employees as the target of the assessment. It is aimed at measuring the actual related risk, ensuring compliance with laws and regulation.
This approach, called social-driven vulnerability assessment, attempts to go beyond the traditional security assessment, including both the social engineering factor and the related technological consequences as seen through a cyberattack simulation.

Results based on my work experience in the last 5 years show that social engineering attacks are often an underestimated risk. Employees can be deceived into performing dangerous behaviors, such as visiting a web site that could put the company at risk. Moreover, as found through a technological follow-up aimed at simulating a cyberattack enabled from these kinds of behaviors, it is usually possible to bypass the defense layers and obtain access to sensitive information.

The obtained results (i.e., the percentage of employees who fall for a phishing attack or evidence of critical projects or customer data accessed through an attack simulation) are quite impressive and have the advantage of being understandable to nontechnical people. Sharing these results with management could help IT officials obtain the necessary permission to implement countermeasures to social engineering threats, such as awareness initiatives.

Read Roberto Puricelli’s recent ISACA Journal article:
The Underestimated Social Engineering Threat in IT Security Governance and Management,” ISACA Journal, volume 3, 2015.

[ISACA]

More Bad News: The Bad Guys Are Getting Better

If there’s one lesson to be gained from all the security breaches and revelations of major bugs in security protocols in 2014, it’s that attackers are upping their game and finding more opportunities. That’s only reinforced by several new studies.

German security company G Data, for example, reported a huge increase in the number of new malware strains in the second half of the year — on average, a new type was discovered every 3.75 seconds! For the year as a whole, just under six million new malware strains were seen in the wild, some 77 percent more than 2013’s total.

Not all kinds of malware saw an increase. Those using backdoor vulnerabilities in software fell, for example, and worms and spyware remained relatively flat. But rootkits, while still a very small percentage of the overall number of malware, jumped more than ten-fold in the second half of the year.

Rootkits are software included in malware that help to embed the malicious part of the package in a system and ensure the persistence of additional attacks by helping the malware evade the scanners and monitors now used to detect it.

Not surprisingly, malware developers are mainly targeting the ubiquitous Microsoft platforms, with malware programmed as .NET applications continuing to rise. Overall, new variants for Windows platforms made up 99.9 percent of the new malware variants.

More problems could arise with Microsoft’s withdrawal of support for Windows XP in April last year, G Data said, because systems still using this operating system are “unprotected against attacks on existing or newly discovered security holes going forward.”

Akamai Technologies’ most recent State of the Internet survey similarly reported more than double the number of distributed denial of service attacks in the first quarter of 2015 compared to first quarter 2014, and over 35 percent the number in the final quarter.

DDoS attacks may not be such a big deal for the public sector, which gets only around two percent of the total. But Akamai noted a potentially dangerous trend in the 2015 attacks, with peak DDoS attacks of 100 Gbps making up a significantly bigger part of the total. That suggests attackers have been developing better ways to maximize the impact of their work.

At the rate attacks are progressing, Akamai said, security researchers are concerned about what attackers may be able to accomplish by this time next year. Add to that the fact that employing current attacks techniques “has not required much skill,” and even relatively inexperienced attackers could be capable of creating major damage as more potent tools enter the picture and attack bandwidth increases.

And what, then, to make of the recent news that the Defense Department is going to take a “no holds barred” approach with users who threaten security with sloppy cyber habits? Bad cyber hygiene “is just eating our shorts,” according to David Cotton, deputy CIO for Information Enterprise at the Pentagon.

Users will be given a very short time to comply with DOD password-security policies or to change behavior that invites phishing attacks while using  third-party social media accounts. The Pentagon is also pushing vendors to come up with more timely patches for security vulnerabilities, though recent research also points to the need to make sure patches are updated on all hosts at the same time.

The DOD, along with the intelligence agencies, is considered to be better at security than most other parts of the government, so it’s a little startling to read that the Pentagon’s crackdown as aimed at giving department leadership “a consolidated view of basic network vulnerabilities.”

Isn’t this supposed to be the very first thing organizations do when assessing security needs? And if the DOD doesn’t even have this bit of the puzzle sorted out, how is it ever going to successfully defend against the threats indicated by the G Data and Akamai reports?

Perhaps it’s finally time for government organizations to give up on security that is user focused. The Cloud Security Alliance’s “Dark Cloud” project could be one way of doing that.

Posted by Brian Robinson

[GCN]

English
Exit mobile version